{"id":67466,"date":"2016-03-14T02:43:38","date_gmt":"2016-03-14T06:43:38","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/new-ways-to-fingerprint-tor-browser-users-discovered-help\/"},"modified":"2016-03-14T02:43:38","modified_gmt":"2016-03-14T06:43:38","slug":"new-ways-to-fingerprint-tor-browser-users-discovered-help","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/new-ways-to-fingerprint-tor-browser-users-discovered-help\/","title":{"rendered":"New ways to fingerprint Tor Browser users discovered &#8211; Help &#8230;"},"content":{"rendered":"<p><p>    Users who want to remain anonymous online often opt for using    the Tor Browser, which hides their real IP address, but there    are techniques that (more or less) malicious actors can used to    identify them.  <\/p>\n<\/p>\n<p>    Browser and system fingerprinting are two of them. And while    the Tor Project has already implemented a number of    countermeasures against different fingerprinting methods, newer    ones are popping up every now and then.  <\/p>\n<p>    The latest ones have been demonstrated by security researcher    Jose Carlos Norte.  <\/p>\n<p>    He created proof-of-concept JavaScript code that can be    inserted into the source code of a website to extract    information about how users interact with their computer, their    hardware, the computing power and memory speed of their    computer, and so on.  <\/p>\n<p>    This code allowed him to:  <\/p>\n<p>    The script manages to collect this information because Norte    found a way to bypass the protection of the Date.getTime()    method, which prevents measuring of events happening under    100ms.  <\/p>\n<p>    If a website is able to generate a unique fingerprint that    identifies each user that enters the page, then it is possible    to track the activity of this user in time, for example,    correlate visits of the user during an entire year, knowing    that its the same user, Norte explains.  <\/p>\n<p>    Or even worse, it could be possible to identify the user if    the fingerprint is the same in tor browser and in the normal    browser used to browse internet. It is very important for the    tor browser to prevent any attempt on fingerprinting the user.  <\/p>\n<p>    Here is an example of how the fingerprint of different users    using the same Tor browser version but different computers can    differ:  <\/p>\n<\/p>\n<p>    Whether this fingerprinting method can ultimately lead to the    unmasking of Tor users or not is debatable, but its good to    know that security researchers are probing the defenses of such    crucial software, because we can be sure malicious users do so    constantly.  <\/p>\n<p>    Norte hopes that his research will spur Tor developers to find    a solution to this problem. Apparently, it already has.  <\/p>\n<p>    In the meantime, in this particular case, users can protect    themselves by simply disabling JavaScript on the Tor Browser    (it is currently enabled by default).  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Excerpt from:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.helpnetsecurity.com\/2016\/03\/11\/fingerprint-tor-browser-users\/\" title=\"New ways to fingerprint Tor Browser users discovered - Help ...\">New ways to fingerprint Tor Browser users discovered - Help ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Users who want to remain anonymous online often opt for using the Tor Browser, which hides their real IP address, but there are techniques that (more or less) malicious actors can used to identify them. Browser and system fingerprinting are two of them. And while the Tor Project has already implemented a number of countermeasures against different fingerprinting methods, newer ones are popping up every now and then <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/new-ways-to-fingerprint-tor-browser-users-discovered-help\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-67466","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/67466"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=67466"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/67466\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=67466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=67466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=67466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}